Analysis
-
max time kernel
36s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20240508-en
General
-
Target
test.exe
-
Size
75KB
-
MD5
07202b2ac038a5853ee4fb88dcb9a899
-
SHA1
1cbe3734d3594cd2430e699e63972da458562dd3
-
SHA256
90cee64c0da47de7b66c5f50120051e3797f14c5609aea1c5e1aaf10e10537a8
-
SHA512
75c79157f14bb226ea3fedc011e79bfd57aed6a94f1a97c518755289da6bbcb9eeeeb327d45e70ed1e7d69e24a863f76ad0fc78dda593817b513c678de10c0c5
-
SSDEEP
1536:GOXQrSji6XN9+GVqQ7zgN9ebqvjoJExemwHX9TM:GOXQA+QqQfgNY0emcQ
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win32 = "C:\\Windows\\Win32.exe" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in Windows directory 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Win32.exe cmd.exe File opened for modification C:\Windows\Win32.exe cmd.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2076 taskkill.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Modifies registry key 1 TTPs 5 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exepid process 2608 reg.exe 2672 reg.exe 2676 reg.exe 2868 reg.exe 2616 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2476 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
taskkill.exeexplorer.exedescription pid process Token: SeDebugPrivilege 2076 taskkill.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe Token: SeShutdownPrivilege 2476 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
Processes:
explorer.exepid process 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
Processes:
explorer.exepid process 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe 2476 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
test.execmd.exedescription pid process target process PID 2028 wrote to memory of 3040 2028 test.exe cmd.exe PID 2028 wrote to memory of 3040 2028 test.exe cmd.exe PID 2028 wrote to memory of 3040 2028 test.exe cmd.exe PID 3040 wrote to memory of 2076 3040 cmd.exe taskkill.exe PID 3040 wrote to memory of 2076 3040 cmd.exe taskkill.exe PID 3040 wrote to memory of 2076 3040 cmd.exe taskkill.exe PID 3040 wrote to memory of 2608 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2608 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2608 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2672 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2672 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2672 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2676 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2676 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2676 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2868 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2868 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2868 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2616 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2616 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2616 3040 cmd.exe reg.exe PID 3040 wrote to memory of 2476 3040 cmd.exe explorer.exe PID 3040 wrote to memory of 2476 3040 cmd.exe explorer.exe PID 3040 wrote to memory of 2476 3040 cmd.exe explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\760.tmp\test.bat" "C:\Users\Admin\AppData\Local\Temp\test.exe""2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\system32\reg.exeReg Delete HKLM\System\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:2608 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Win32 /t REG_SZ /d C:\Windows\Win32.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2672 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:2676 -
C:\Windows\system32\reg.exereg Delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2868 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:2616 -
C:\Windows\explorer.exeexplorer.exe3⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53423bfcd5d796f351d6877277656dce0
SHA1fd97b809225bd6410667ef6186b9b65632566a99
SHA25683a6299c3d4dcb0a864de86be96059106125204e949098d4c718f5312496b47c
SHA5128af1c2c263d6385beda9e213988447dd1b79223ee286fec849d067fa0d4950af8cfafdf47812c59723558f1f28b693e077edc61308c9859d33f9e2838c4ddde6